According to the above diagram, first malicious traffic signatures should be obtained from the raw data and then added to the database. In order do this, datasets which are related to the NTP Amplification attacks, Mobile Botnet attacks, Slowloris attacks and Volumetric attacks are used. Then, by using the feature selection, generation of the SDS will be done and afterwards the Machine Learning Algorithm is being trained. Then it is supplied to the system of traffic classification.
**System Backend Diagram**
As shown in the above figure admin dashboard is connected with the REST API and also it is connected to the client server. Once a request comes to the server it will be directed through the REST API. Therefore, it will detect whether it’s a malicious packet or not. If it is a malicious packet, the user will be alerted through the admin dashboard.